Skip to content

About Me

NoSec

“We are the noise in your system.”

NoSec

Pentester

Red Team

📢 Latest Update
Just click the title. It's all there. //

You’re not seeing the world as it is, you’re seeing it as they want you to.


🚀 About Me

I’m a Red Teamer who doesn’t just break into systems — I dismantle assumptions.
A Junior Pentester with a senior’s mindset, deep in the art of stealth, evasion, and weaponized curiosity.
Based in 🇭🇺 Hungary — working fully remote.
I build tools, hunt bugs, exploit logic, and leave breadcrumbs only when I want to be followed.


  • 🔐 Certifications & Training
  • TryHackMe: Pre-Security · Web Fundamentals · Jr Pentester · Security Engineer · Pentest+
  • PT1 (Pentester Level 1)hands-on exam prep in progress
  • Certified Red Teamer – CRTExamX @ SecOps Group – ongoing
  • Currently building my own internal red lab for AD, Linux, and hybrid attack simulations

  • 🎖️ Rankings

  • TryHackMe: Top 1% (#47 🇭🇺 / #6114 🌍)
  • Hack The Box: Pro Hacker #444 / 43+ machines rooted
  • Private Bug Bounty Programs: invited researcher on HackerOne & Hackrate

🧰 Toolbelt

nmap · ffuf · BurpSuite · sqlmap · BloodHound · Certipy · CME · Rubeus
Ghidra · WinPEAS/LinPEAS · Mimikatz · Empire · Mythic · Responder · Impacket
netcat · meterpreter · hashcat · john · Kerbrute · Sliver · Custom Python tools

I don’t just use tools. I dissect them, modify them, and sometimes write better ones.


🎯 Focus Areas

  • 🏴‍☠️ Red Teaming & AD abuse
  • RBCD · Kerberoasting · AS-REP Roasting · Shadow Credentials · Constrained Delegation
  • Lateral Movement via Pass-the-Hash, DCSync, Credential Dumping
  • Custom post-ex tools & payload chains with C2 (Cobalt Strike, Mythic, Empire)

  • 🔍 Offensive Recon & Initial Access

  • OSINT + custom Python scrapers · phishing lab simulations · remote recon automation
  • Subdomain takeovers · advanced directory brute-forcing · NTLM relays (ntlmrelayx, KrbRelayUp)

  • 🧠 Exploit Development & Reversing

  • Buffer overflows · Shellcode injection · ROP chains · Patch diffing · DLL hijacking
  • CrackMe challenges & reversing CTFs with Ghidra, Radare2, Cutter

  • ☁️ Cloud & Container Security

  • AWS & Azure IAM privilege escalation · S3 misconfigs · Lambda abuse
  • K8s RBAC misconfigs · container breakout · Docker escape via capabilities

  • 💀 Web & API Attacks

  • Advanced GraphQL exploitation · SSRF · XXE · Broken Auth · IDOR chaining
  • CORS misconfigs · prototype pollution · token hijack & logic flaws

  • 🔓 Password Attacks at Scale

  • Bruteforce automation (custom tooling) · mask/hybrid attacks · GPU cracking clusters
  • Corporate credential reuse & password spraying OPSEC safe

  • 👁️ Purple Teaming / Evasion

  • Bypassing Defender, EDRs & Sysmon · LOLBAS abuse · AMSI bypasses
  • Sigma rule tuning & building custom detection logic for adversary emulation

🧠 Philosophy

“Offense is a mindset. Tools are just the vehicle.”
I think like an attacker, build like a developer, and move like a ghost.
My goal? Be untraceable — until I want you to find me.


📬 Stay Connected

💬 Follow me on Telegram for HTB leaks, CTF hints, and hacker tooling drops.
🐦 Hit me up on X for hacking rants and OSINT tricks.

Stay rooted. Stay paranoid.